Implementation and Design of SHA-1 Algorithm
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 10
Abstract
The substantive technologies are having so plenty algorithms for crypto systems. All the technologies are famous for message authentication or message compression techniques like DSA, RSA and SHA- 1.These are majorly streamed on compressed techniques only not on Authentication Requirements like Masquerade, Content Modification, Sequence Modification and Timing Modification. However the previous SHA-1 failure using brute force attack in 280 operations and Collision failure found in 2005 in 233 operations. So we address the above problem and focused on SHA-2 cryptography algorithms.
Authors and Affiliations
Chandra sekhar murala| Research scholar(M.Tech), Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem chandumurala@gmail.com, M. Purnasekhar| Asst. professor Dept.of CSE,Nova College of Engineering & Technology, Vegavaram,Jangareddygudem
A Study To Support First-N Queries And Incremental Updates To Answer Multi Keyword Queries
Most search engines and online search forms maintain auto completion which demonstrates suggested queries or even answers on the fly as a user types in a keyword query character by character. As many search systems a...
Intra cluster similarity of clique by positive and negative objects
Clustering of high dimensional data sets is a challenge in now a days. Finding of good clusters is a big problem for the researchers. The outlier detection of clusters and finalize about the noisy data also an import...
Haze monitoring in wireless systems using ARM7 controller
The overwhelming haze, depicted as a pall of smoke brought about boundless health problems particularly among the elderly, the youthful and children. Haze is a climatic wonder where clean, smoke and different particl...
Finite Element Analysis of Wire Drawing Process with different die contours
Finite element method is a numerical analysis tool for analyzing complex problems. It was originally developed as a tool for structural, Thermal; fluent analysis and magnetic, electrical current flow analysis but the...
Pesticide Toxicity Classification using Data Mining Techniques
Agriculture is the main occupation of our working population in India. The techniques and strategies used in agriculture since ancient times varied with many different civilizations. As time varied, the attitude towar...